Hacker Newsnew | past | comments | ask | show | jobs | submit | odinduty's commentslogin

>shortly after releasing their official mobile clients

???


I wonder if this will mean more and more servers are going to be sued. I've been playing on private servers since 2012, I play hours each day, and the future does not look very bright if this keeps happening I'm afraid...

Just two days ago I started my journey as a blood elf hunter :-)

The problem with private servers is that they seem to be addicted to OVH. I get it that it's cheap, has nice routes and usually they don't give a damn about what you host, but it's a single point of failure. I wonder if many of those servers are about to move to Ukraine (Russia) or something like that :-)

Ah, and believe me, some of them make ludicrous amounts of money, have paid employees, etc. It's not just a community. They all forked MaNGOS or TrinityCore and starting piling up their fixes on top of it (which they don't have to share because it's GPL, not AGPL), but some chose to pay their developers!

I'm happy to answer any questions about what it's like to play on private servers or how some stuff works in the technical side, or the community, or whatever!


How much administrative effort does it take to operate a private server? I've always kind of conceptualized it as a duct-tape-and-baling-wire affair, but I have a sneaking suspicion things are a lot more professional these days.


Ah, the Twitter app for Android (beta version) recently added a feature that allows you to add a description to pictures you upload for impaired people.


All phone platforms are viable, it depends on what you expect from them...


I'm not sure, but I think WhatsApp stores your key and it sends it to your mobile so you can decrypt the backup you downloaded from Google. But you can disable backups...


Conversion is done by the devices I think.


Well, often they really think nothing will change because they were promised nothing will change.


Isn't that a clear indication for lack of experience? I've been through my fair share of acquisitions and I've never been told things won't change.


And why not? A project is a project, and some twat who happens to have the keys to the Twitter account of that project should not define how you should feel about a community.


Nice ad.


> Secure Boot [...] requires FOSS users to purchase a license from Microsoft

Nope.


Requires purchase of a cerficate from one of the authorities Microsoft recognises (Verisign/Digicert/...) and then the signature of Microsoft on compiled bootloader code. Either way, you have to pay and you have to get Microsoft's permission.


It certainly does not require FOSS users to purchase a license. There is already a shim loader signed by a MS-recognized authority, which ships with a signed copy of MokManager, which lets you register a "machine owner key" of your own choosing. You can then use that key to sign kernels for your own machine, or for anyone else who wants to go through the on-screen enrollment step to trust your key.

https://mjg59.dreamwidth.org/20303.html

No additional money has to change hands between anyone, and no additional permission needs to be granted from Microsoft to anyone. (You have to get the permission of someone with physical access to the machine during boot, but if your goal here was FOSS users controlling their own computing, it's a good thing that that permission is required.)


IFF you want to support the default set of keys installed on computers that ship with Windows. Secure Boot does not prevent you from installing your own keys, in fact most linux distributions do this already and just use a shim loader signed by Microsoft, the rest of the chain is signed by custom keys (the keys are silently and automatically installed for you).


> IFF you want to support the default set of keys installed on computers

Which happens to be a case if you want to use a extension card with its own BIOS. If it is signed, what key is used? Can you resign with your own?


IIRC, Secure Boot spec said there must be multiple trust anchors, i.e. it's not like "user's own or Microsoft", but there can be any combination of trusted CAs (and I bet there's NSAKEY somewhere, huh).

I'm not sure about the implementations and real-world situation, but as far as I get it, with X.509 with Secure Boot generally uses, one should be able put the exact card's vendor certificate (not MS CA root one) to trust the extension card. (Sadly, I think there's no way to trust one specific signature.) I guess that's probably very non-trivial in practice.

At worst, one should be able to put their own CA (to sign their own software) and be forced to add MS CA to trust the third-party software as well. But - if UEFI implementation allows user-defined CAs - it should be possible to run your own code without asking Microsoft's permission.


You can add your own without wiping the pre-installed ones.


To be fair, I think this is only for tablet & mobile.

On desktops and laptops I've seen, there was a way for end-user to upload their own trusted certificates and use those instead of Microsoft ones, and I think that's when done like this (when, whatever the defaults are, end-user can get in control), Secure Boot is a good idea - even though the implementations are not.

I guess there must be some ignorant (or malicious) desktop/laptop vendors that don't provide key management options, but hope there isn't many.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: